Alien Relic Hunter

Chapter 522 DDoS Attack

This hacker launched an attack on the Anaheim company's network server with only two purposes: first, to delay the deadlocked press conference; second, to destroy evidence, even if there is an audit, it can also be disclosed to the outside world. Claiming that data has been destroyed by hackers can also create an image of a victim and gain public sympathy.

Of course, Ke Lan doesn't know how many people will sympathize with them in this situation. Although the live broadcast of the press conference was interrupted, the netizens who watched the live broadcast came back to their senses and the screen was black. The barrage in the live broadcast room was refreshing crazily, and the content was basically all greetings to the female relatives of Anaheim company executives...

Public opinion has basically shown a one-sided trend. This time it was the Morgan consortium's turn to block the news - but their request was rejected by the major mainstream media without exception.

At the same time, in a light-tight room, six young people dressed like street gangsters, with high-end VR helmets worth hundreds of thousands of credits on their heads, sat cross-legged around a pile of Beside the low table of the computer case and mobile terminal, hands wearing motion capture gloves were rapidly tapping the air in mid-air.

Through the transparent outer panel of the VR helmet, they could vaguely see dense lines of code projected in front of their eyes. With the high-frequency flashing of the chassis indicator light, these codes were scrolling rapidly, as fast as sixteen The credits are the same for movies played at double speed.

A middle-aged man in a suit was walking around with an anxious look on his face. He wanted to say something several times, but he swallowed the words that reached his throat back into his stomach.

Just when the middle-aged man was about to turn around and get a glass of water, several young people wearing VR helmets let out a sigh in unison.

If you get close to their helmets at this time, you can find that the rapidly scrolling codes have stopped one after another, as if the invisible rotating shaft is stuck by something.

"What's wrong?" The middle-aged man didn't care about pouring water, and quickly walked behind a few people and asked.

"We...we seem to have been caught." One of the young men wearing a helmet said, "This is impossible...Our IP address keeps changing. How did he catch us?"

"Caught? You mean you were discovered?" The middle-aged man suddenly widened his eyes, "Who is the other party? Is it an official white hat?"

"No...no." The young man who spoke earlier shook his head, "It's not like the official people. If it were them, we should have received a warning notice by now..."

"This guy is just like us, he's also black." Another young man said. From the sound of his voice, he should be a woman, but he had a washboard figure that was almost as flat as the front and the back, plus a helmet that covered the entire head. , making her look completely no different from the man sitting next to her.

"He is launching an attack on us... uh, using such a primitive attack method?" The hacker who was the first to say this was stunned, and then suddenly jumped up from the ground, "This is impossible! Where did he come from so many Attack resources? How many 'broilers' has he hijacked?!"

"What's going on? What's going on?" The middle-aged man also became nervous, "Have your identities been exposed? Is it no longer safe here?"

"Our physical IP should not be exposed yet...but we can't continue the intrusion."

"What do you mean? You are all top hackers, but if you join forces, you still can't defeat one of your opponents?" the middle-aged man said angrily, "Isn't it because the price we offered is not generous enough?"

"No, Mr. Morgan, you misunderstood me." The hacker shook his head and took off his helmet. "The other party used the most primitive DDoS attack. This attack method has nothing to do with technology. It is just a competition. The total amount of network resources in the hands of both parties... Although I don’t know where the other party has transferred so many resources——"

Before he finished speaking, the middle-aged man interrupted him: "DDoS attack? It's the kind of attack that relies on a large number of useless data packets to block our server, right? Then can't you just turn on the firewall?"

"It's not that simple." The young hacker could only explain to him with a wry smile, facing the "layman" who knew little about the attack process, "Our best response now is to unplug the network cable and take all servers offline. If you want to To continue to invade the Anaheim server, we must withstand the other party's attacks...The firewall can block most attacks, but it will also block the data we transfer back."

"How much is left on the Anaheim server?" The middle-aged man pondered for half a second and then asked.

"There are still nearly one-third of the evidence that needs to be 'destroyed', and a full half of the data that needs to be 'relocated'," the hacker replied.

"Don't worry about that information for now. Delete all documents such as bills and make them as clean as possible."

Now that the funder's father had spoken, the young hacker had no choice but to put on the VR helmet again, but before he could sit down, several people in the room asked about the peculiar sting that occurs when plastic is burnt. Nasal smell.

"What's the smell?" The middle-aged man's nose twitched twice, "Did something burn? Have any of you been to the kitchen?"

But he realized in a second - there was no kitchen in this temporarily rented house. Including himself, several people still relied on lunch boxes for lunch, and paper lunch boxes were piled in the room. Inside the corner!

"Server!" the female hacker suddenly screamed, "The server is overloaded! It's overheated!"

"What did you say?!" The middle-aged man rushed to the next room and opened the door.

Suddenly, a choking smell of smoke hit his face, almost knocking him out of breath.

The other two hackers also rushed to the door of the room. They pushed aside the smoke and looked inside——

This small room of less than 20 square meters is filled with modular shelves. Each layer of the shelves is filled with expensive servers. Hundreds of cables are bundled together, as if they are tied together. Several of them occupy all the space on the ground. At this moment, several servers with poor heat dissipation positions were constantly emitting black smoke, and green-yellow flames were rapidly spreading along the rubber outside the cables.

"This...this..." The middle-aged man rubbed his eyes that were blurred by the smoke. Only then could he see the situation in the room clearly. He felt like he had fallen into an ice cave and couldn't help but shiver - you know , the valuable technical information copied from the Anaheim database can now be stored in these dozens of servers.

And these servers are now burning...

"Do you have a backup of those data?" He looked at the hacker beside him and asked with trembling lips.

"No." The other party shook his head, "There is no backup... It's too late at all, and the storage device is not enough..."

"Then why are you still standing there, hurry up and rescue the server!" the middle-aged man shouted hysterically. He turned around, looked around, and his eyes immediately locked on the kettle beside him. There was also a kettle next to it that he had not had time to pour. Glass of water.

"Get out of the way!" The middle-aged man pushed away a hacker behind him, rushed to the table in three steps, grabbed the kettle, and rushed to the room where the server was placed.

"Wait! Mr. Morgan! You can't use water!" The young hacker took a look and quickly hugged the middle-aged man's waist. "There are all wires in here. If you put this pot of water in, everything will be short-circuited! Now there are only a few A server is on fire, and most of the servers are not damaged, but once there is a short circuit, there will really be nothing left!"

"Then we should move out the undamaged servers!" the middle-aged man holding the kettle said urgently.

Except for the young hacker who stared at the smoke and rushed in at the beginning, the other people actually stood there, staring at the middle-aged man with indifferent eyes, as if they were telling him: You just paid Money for work, fire in the computer room is none of our business, why should we risk electric shock to help you rescue it?

This is indeed the case. Except for the young hacker who has been talking to the middle-aged man, who is the Morgan consortium's own technical consultant, these other hackers are all temporarily recruited "mercenaries". These people clearly mark their prices and take money to do things. , if it is a dirty and dirty job, an extra large amount of "hush money" will be charged.

"Why are you standing still?!" The middle-aged man slammed the lid of the kettle on the ground, panting and glaring at the people.

"The contract does not specify how to deal with this situation. According to industry regulations, we are not responsible for such emergencies by default." The female hacker took out a piece of bubble gum from the pocket of her sweater, peeled off the wrapper and threw it into her mouth. He said, "You can ask us to help you, but you have to pay more."

"You!" The middle-aged man gritted his teeth. He wanted to threaten these hackers with words, but he also knew very well that these people were all veterans who had been on the road for many years, and similar jobs were not allowed. This is the first time they have taken the call. They are not afraid of threats such as "silencing" - if the Morgan consortium dares to "take advantage of others" after the incident, these shady things will soon be made public in various ways. .

"Okay, you need to add money, right? How much? You make a price, hurry up!" The middle-aged man suppressed his anger and took out a card holder from the inner pocket of his suit, which was full of large denominations. Bearer credit point stored value card.

Greed flashed in the eyes of several hackers. The young girl stuck out her tongue, licked her lips, and said, "Fifty thousand... no, one million!"

"Are you trying to take advantage of the situation?" the middle-aged man said angrily. This million is not the total price, but refers to one million per person.

"I don't know if we are taking advantage of the fire, but I know that if you delay it any longer, the fire inside will become bigger and bigger..."

"Here you go!" The middle-aged man took out a few black and gold stored-value cards and slapped them on the table.

"I changed my mind again, two million." The girl stretched out her hand and covered the cards.

"Don't push yourself too far!" The middle-aged man's face suddenly darkened, and the girl raised her eyebrows. She suddenly felt that the commonly used metaphor in novels "as gloomy as dripping water" did not seem to be an exaggeration, because Now their sponsor's face is really dripping...

Sweat and smoked tears mixed together and slid down the curve of his cheek to his chin. The middle-aged man's upper body muscles tightened, as if he would pounce at any time.

"Don't be nervous, I'm just joking... After all, we are very trustworthy." The girl laughed dryly, took the stack of stored-value cards, and gave them to her companions.

"Then go to work quickly..." the middle-aged man said one word at a time.

"By the way...Mr. Morgan, are we going to continue attacking Anaheim later?" Another hacker suddenly asked.

"What an attack! First grab all the servers, and then find a way to recover the lost data... Remember, if I die, you won't even have a chance to live!" the middle-aged man said through gritted teeth. It is very clear that if the technical information "stolen" from Anaheim is destroyed because of this incident, then the rest of his life will definitely be ruined... In this case, he will risk the incident being exposed. Even if it's a risk, he has to drag these bastards to be buried with him.

"Um...Mr. Morgan, there seems to be something shining in your pocket." The hacker said again.

"What?" The middle-aged man known as Mr. Morgan was slightly startled, "What are you talking about?"

"Your phone... seems to be lighting up."

"This is impossible. To be on the safe side, I turned off my phone before entering this room." As he spoke, he lowered his head - but when he saw the white fluorescence coming out of the slit in his pocket, his whole body was filled with excitement. But he was stunned for a moment.

There are only two things in his pocket: the key card of the hovercar and his mobile phone, and the former cannot shine at all.

The middle-aged man quickly took out his mobile phone - his mobile phone was turned on at some point, and the recording function was automatically activated. Judging from the time displayed on the screen, the recording had been recorded for almost a month. Ten minutes ago.

In other words, the recording had already started before they were attacked by DDoS...

In other words, all the conversations he had with these hackers just now were recorded...

Not only that, there is another running program in the taskbar of the phone that he has never seen before. Although he does not know much about computer technology, the simple and easy-to-understand UI of this running program can still be understood - every second of recording on the phone , an audio file will be automatically generated and then sent to the outside world... As for who it is sent to, it no longer matters...

"It's over." The middle-aged man's heart skipped a beat, his feet softened, and he sat down on the ground.

[P.S. Thanks to Zhang Siyue for the 100 starting coins. 】

Tap the screen to use advanced tools Tip: You can use left and right keyboard keys to browse between chapters.

You'll Also Like